Uploaded by mail

Aadhar Based Electronic Voting System

International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3
Aadhar Based Electronic Voting System
Anish. V, Balaji. M, Santhosh Kumar. S
Students, Information Technology, Panimalar Institute of Technology, Chennai, India
ABSTRACT
Aadhar based voting for increased productivity and
efficiency is one of the primary requirements today
for any organization. 0ur main aim of the proposed
system is to develop a compatible voting machine
with high security. The proposed system is mainly
designed for our country. It has three phases. First the
details of the persons who are above 18years are
extracted from Aadhar card database since it had
become mandatory in present scenario. To ensure
more security, finger prints of the voter is used as the
main authentication resource. Since the finger pattern
of each human being is different, the voter can be
easily authenticated. The system allows the voter to
vote through his fingerprint. Finger print is used to
uniquely identify the user. The finger print minutiae
features are different for each human being. Finger
print is used as a authentication of the voters. This is
done to preserve the security. When people cast their
vote the results will be updated automatically and on
the same day of election, the results will also be
published. Desna Sebastian GreeshmaGopiLiniRajan
“Aadhar Based Electronic Voting System and
Providing Authentication”.In this paper we propose
compatible voting that are efficiently implementable
using gsm for the security to voters.
1. INTRODUCTION
The paper describes the policy with respect to
electronic approaches and development towards
electronic data transmission and storage. Finger print
module for voting machines and different existing
identity documents are enforced during this project
which can help ballotters to cast the vote in any
situation. The Internet of Things has immense
potential to change many of our routines, daily
activities and behaviors. The pervasive nature of the
internet means that a large amount of data regarding
to possibly every aspect of public and private will be
produced, transmitted, collected and stored. The
project deals with the polling machines which uses the
biometric validation and cloud storage. It also
increases the security provided in the current polling
machine. The cloud is secured with the encryption
and the decryption techniques we plan to implement
this project with the help of Arduino board with the
capability to perform the IoT operations. We plan on
using Arduino Mega Board to implement this project
which is a microcontroller. It has digital input/output
pins, analog inputs, crystal oscillator, a USB
connection, a power jack, UART and a reset button. It
contains everything needed to support the
microcontroller, connect it to a computer with a USB
cable. The Mega is compatible with most shields
designed for the Arduino Duemilanove or Diecimila.
The voting system in present days requires a manual
registration with a voter id with which voters are
allowed to vote. The ballotters can vote only when
they provide the voter id in the pooling booth. The
major drawback of voting is bogus votes. To
overcome those we use many authentication
standards.
Aadhar is unique identification authority of India
which every personal should be enrolled in it. For
every governmental action performed it requires the
Aadhar card provided with biometric authentication
which assures that the person has all the right to
perform the required action. The proposed process
reduces the whole man power in the polling booth and
also reduces the man power used in the counting
process. All the action performed is automated and
can also be monitored whenever needed. An
algorithm is used for encryption and decryption which
ensures the security for the votes.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
Page: 1634
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2. LITERATURE REVIEW
1) Electronic
voting
communication
using
near
field
Authors-Syed Mahmud hasam
In recent times there has been a decline in the
confidence of common people over electronic
voting machines (EVMs). More anticipated than
what the reality actually is, today's automated vote
casting methods have faced immense controversy
related to being vulnerable to hacking and
questions have been raised about their
transparency and security. This paper proposes the
design and development of a novel tamper
resistant electronic voting system that aims to
mitigate the recurring issues and flaws of existing
voting machines of today. To elucidate the system
in brief, multiple layered verification process
would be carried out on a potential voter by the
means of fingerprint recognition and a Near Field
Communication (NFC) smart card entry in order
to authenticate his or her identity. Subsequently,
the person would cast the vote by pressing a
button corresponding to a particular candidate
which would be recorded in the system providing
the vote caster a visual confirmation. The final
vote would then be printed out spontaneously onto
a ballot box using a POS (Point of Sales) printer
for an added level of validation. This system not
only prevents multiple vote casts, but also
eliminates the discrepancies that commonly arise
with a person claiming not to have voted, whereas
his or her name is present in the list of vote
casters. The project is an incremental extension of
a previous research.
2) RF-ID match-on-card sui generis
Authors– Md.Tahmid Rashid
Elections casts an ennobling influence on the
minds of people and forms the prominent feature
of our country-India, in which every individual
participates vigilantly and the populace remains
the sovereign power. The world has been
experimenting with diverse technologies to
conduct controversy free elections, to fulfill the
elementary needs of the people. It should be taken
into account that no elector should be
disenfranchised from their voting rights. Our main
objective is to design a model to provide equitable
elections. In this project, the baseline information
stored in the RFID tag provides topical reference
data that mediate intensive computational
prerequisite, it also provides easy match-on-card
sui generis feature and meet the constraint that
only eligible voters can cast their vote. Moreover,
added tier of security is enforced as bio-metrics. It
is seen that there is a noticeable diminution in the
turnout rate of voters, especially the youth. To
foster participation among all demographic
groups, our design looks into the multiple
dimensions and notes all security requirements
and provides an inexpensive solution based on
RF-ID, GSM and fingerprint module in quest for
election legitimacy.
3) Smart card using proteus professional software
Authors- MD.ShadmanSakib Chowdhury
In improved electronic voting machine using a
microcontroller and a smart card is presented.
The identity control that was done manually is
eliminated and replaced by a smart card. It also
saves the elector's card number, number of
electors, and the voting results while ensuring
anonymity. The results are only accessible for the
administrator card. The simulation is done using
Proteus
Professional
Software
V7.
Microcontrollers are programmed in assembly
language under MPLAB IDE software V.8.56.
4)Direct recording electronic ic card reader
Authors - Md. KhalilurRhaman
There have been several studies on using
computer technologies to improve elections and
these studies lead to widespread adoption of
“direct recording electronic” (DRE) voting
systems in recent years. In an electronic-voting
system, voters go to their voting places and prove
that they are allowed to vote there by presenting
an ID card with signet. After this, the voter is
given a token that allows them to vote for their
candidates of choice at a voting machine. When
the voter’s selection is complete, DRE systems
with typically present a summary of the voter’s
selections, giving them a final chance to make
changes. Subsequent to this, the ballot is cast and
voter shall return the given token to ballot box
and leave voting place.In this research, we design
and implement an e-voting system that provides
DRE capability. Our e-voting system is equipped
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
Page: 1635
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
with an IC card reader and a touch-panel LCD.
Cost and security are the two most important
facts to the success of our e-voting system. Low
cost on the token is obtained by selecting reusable contactless IC card as voting token.
Security of our e-voting machine is obtained not
by secrecy, but by openness and secure coding of
software.
3. EXISTING SYSTEM:
ADVANTAGES
SYSTEM:
OF
PROPOSED
• Secure voting with unique identity.
• Improved performance and efficiency
• Better in scalability when compare with
existing systems

In developing countries like "INDIA" the
election
commission
follows
manual voting mechanism which is done by
electronic voting machine. This machine is
placed in the poll booth center and is
monitored by higher officials. due to some
illegal activities the polling center are misused
and people's vote to right has been denied.

The automated voting systems are developed
before some years ago. The existing systems
have only been approved in developed
countries. That too, not in all developed
countries. Because the security has not yet
been fully preserved. We moved onto
automation mainly to rely on security.
DISADVANTAGES
SYSTEM:
 Hospitalized person can also be able to vote by
using GSM module with his Aadhar card
number.
OF
5. ARCHITECTURAL DIAGRAM:
EXISTING
6. Conclusion
 Lack of Security while voting.
 Poor performance and efficiency
compared with proposed system.
 Existing system has scalability problem.
4. PROPOSED SYSTEM
 This system proposed a secure online voting
system by utilizing the concept of biometric
 Our Proposed System is a finger-print based
Application that enhances our country with a
better voting system to ensure 100% voting
 Since the existing voting system is not having
high security our project will overcome this
major drawback.
We proposed an efficiently implementable version of
an algorithm is designed to provide a secure data and
to provide a trustworthy election amongst the people
of the democracy. The percentage of the voting will
be increased by utilizing the mobile application. In
future Aadharcard is the most needed for a person
identity hence deploying a election process using it is
highly recommendable. The time consumption for
casting a vote is reduced comparatively when
compared with the current scenarios and outperforms
other existing secure data sharing schemes interms of
performance and scalability.
7. REFERENCES
1) Benaloh, J.&Tuinstra, D. (1994) “Receiptfree Secret-Ballot Elections”, In Proceedings
of the 26th ACM Symposium on Theory of
Computing (STOC’94), Montreal, Canada.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
Page: 1636
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2) APPENDIX 2J, Experience of electronics
voting
overseas.
THE
POLICYINSTITUTE,TRINITY
COLLEGE DUBLIN.Dr.Kenneth Benoit
,Department of Political Science TCD.
3) Brenock, M. (2004) Cabinet to press ahead on
e-voting in EU and local polls. The Irish
Times.
4) California Secretary of State Ad Hoc Touch
screen Voting Task Force Report
5) Caltech-MIT. (2001) Voting: what is, what
could
be.
Cal
Tech-MIT
Voting
technology Project Report
6) Cetinkaya, O. &Cetinkaya, D. (2007)
“Towards Secure E-Elections in Turkey:
Requirements and Principles”.
7) Chaum, D. (1981) “Untraceable Electronic
Mail, Return Addresses, and Digital
Pseudonym.
8) Chaum, D. (1982) “Blind Signatures for
Untraceable Payments”.
9) Chaum, David (2000) Secret-Ballot Receipts
and Transparent Integrity.
10) Cranor, L. &Cytron, R. (1997) “census: A
Security-Conscious Electronic Polling System for
the Internet”.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
Page: 1637